Breaking

Russian Cybercrime Group steals 50 million passwords from 890K devices

Information stealing malware under the Stealer-as-a-Service model is being distributed by 34 Russian Cybercrime Group. The infostealer has now successfully stolen 50 million passwords in 2022.

As per a report published by Group IB, “The underground market value of stolen logs and compromised card details is estimated around $5.8 million”.

The infostealer malware has the stolen passwords, and have harvested 113, 204 crypto wallets, 2.11 billion cookie files and 103, 150 payment cards as well.

Source: Group IB

Most of the victims of this malware are from the USA, Brazil, Germany, Indonesia, India, Philippines, Vietnam, Italy, France and Turkey. In overall, around 111 countries and their 890,000 devices were infected by the infostealer malware.

34 Russian Cybercrime Group and their infostealer malware threat

As per the Group IB researchers the Russian Cybercrime Groups have previously participated in the Classiscam Operation already. The hackers have been active on the Telegram with 200+ members in their channel.

Source: Group IB

The members orchestrate the deployment of infostealer malware using bait website that impersonate popular brands and manipulates users into clicking links.

These links were found in Youtube Video Reviews on Games, Lotteries and other social media platforms.

“Administrators usually give workers both RedLine and Racoon in exchange for a share of the stolen data or money,” the company said. “mentioned  Group IB researchers, stating few use one infostealer malware while others use maximum of three infostealers.

After successful deployment and compromise of the targeted individuals, the data of the users is then sold in the dark web for monetary benefits.

Telegram though is a privacy first chat application, lately it has been found to be brewing grounds for malicious and nefarious entities.

The threat actors are releasing product updates, roadmaps and exfiltrate data samples to market and generate demand for their illegal activities.

As per another report from SEKOIA, there has been seven new traffers teams that has included the infostealer malware known as Aurora to thei threat toolset.

The findings also follow a new report from SEKOIA, which disclosed that seven different traffers teams have added an up-and-coming information stealer known as Aurora to their toolset.

“The popularity of schemes involving stealers can be explained by the low entry barrier,” Group-IB explained. “Beginners do not need to have advanced technical knowledge as the process is fully automated and the worker’s only task is to create a file with a stealer in the Telegram bot and drive traffic to it.” said the researchers.

The internet has been flooded with several new malware, including RapperBot, SocGholish, Bumblebee and more.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

1 day ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago